ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Study on Mechanism of Intelligent Cyber Attack Path Analysis
Jouranl of Information and Security
◽
10.33778/kcsa.2021.21.1.093
◽
2021
◽
Vol 21
(1)
◽
pp. 93-100
Author(s):
Nam-Uk Kim
◽
◽
Dong-Gyu Lee
◽
Jung-Ho Eom
Keyword(s):
Path Analysis
◽
Cyber Attack
◽
Attack Path
Download Full-text
Related Documents
Cited By
References
Recognizing Intrusive Intention and Assessing Threat Based on Attack Path Analysis
2009 International Conference on Multimedia Information Networking and Security
◽
10.1109/mines.2009.108
◽
2009
◽
Cited By ~ 3
Author(s):
Wu Peng
◽
Shuping Yao
◽
Junhua Chen
Keyword(s):
Path Analysis
◽
Attack Path
Download Full-text
Value Driven Security Threat Modeling Based on Attack Path Analysis
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
◽
10.1109/hicss.2007.601
◽
2007
◽
Cited By ~ 21
Author(s):
Yue Chen
◽
Barry Boehm
◽
Luke Sheppard
Keyword(s):
Path Analysis
◽
Security Threat
◽
Threat Modeling
◽
Attack Path
Download Full-text
Cyber-attack path discovery in a dynamic supply chain maritime risk management system
Computer Standards & Interfaces
◽
10.1016/j.csi.2017.09.006
◽
2018
◽
Vol 56
◽
pp. 74-82
◽
Cited By ~ 20
Author(s):
Nikolaos Polatidis
◽
Michalis Pavlidis
◽
Haralambos Mouratidis
Keyword(s):
Risk Management
◽
Supply Chain
◽
Management System
◽
Cyber Attack
◽
Risk Management System
◽
Path Discovery
◽
Attack Path
Download Full-text
Attack Path Analysis for Cyber Physical Systems
Computer Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-64330-0_2
◽
2020
◽
pp. 19-33
Author(s):
Georgios Kavallieratos
◽
Sokratis Katsikas
Keyword(s):
Path Analysis
◽
Cyber Physical Systems
◽
Physical Systems
◽
Attack Path
Download Full-text
Attack path analysis of power monitoring system based on attack graph
IOP Conference Series Earth and Environmental Science
◽
10.1088/1755-1315/645/1/012064
◽
2021
◽
Vol 645
◽
pp. 012064
Author(s):
Xiaojian Zhang
◽
Qi Wang
◽
Xiangqun Wang
◽
Run Zhang
Keyword(s):
Path Analysis
◽
Monitoring System
◽
Power Monitoring
◽
Attack Graph
◽
Attack Path
Download Full-text
An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
◽
10.1109/trustcom/bigdatase.2018.00054
◽
2018
◽
Author(s):
Hui Xie
◽
Kun Lv
◽
Changzhen Hu
Keyword(s):
Monte Carlo
◽
Path Analysis
◽
Search Algorithm
◽
Graph Search
◽
Attack Path
Download Full-text
A Partition Matching Method for Optimal Attack Path Analysis
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)
◽
10.1109/bdcloud.2018.00030
◽
2018
◽
Author(s):
Hui Xie
◽
Kun Lv
◽
Changzhen Hu
Keyword(s):
Path Analysis
◽
Matching Method
◽
Attack Path
Download Full-text
A Monte Carlo Graph Search Algorithm with Ant Colony Optimization for Optimal Attack Path Analysis
2018 27th International Conference on Computer Communication and Networks (ICCCN)
◽
10.1109/icccn.2018.8487462
◽
2018
◽
Author(s):
Hui Xie
◽
Kun Lv
◽
Changzhen Hu
◽
Chong Sun
Keyword(s):
Monte Carlo
◽
Path Analysis
◽
Ant Colony Optimization
◽
Search Algorithm
◽
Ant Colony
◽
Graph Search
◽
Attack Path
Download Full-text
Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric
Lecture Notes in Computer Science - Artificial Intelligence and Security
◽
10.1007/978-3-030-24268-8_25
◽
2019
◽
pp. 266-278
Author(s):
Ziwei Ye
◽
Yuanbo Guo
◽
Ankang Ju
Keyword(s):
Risk Assessment
◽
Path Analysis
◽
Attack Path
Download Full-text
Routing the Cyber-Attack Path with the Bayesian Network Deducing Approach
2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
◽
10.1109/cyberc.2017.13
◽
2017
◽
Author(s):
Yingying Huangfu
◽
Liang Zhou
◽
Chenming Yang
Keyword(s):
Bayesian Network
◽
Cyber Attack
◽
Attack Path
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close